1975
DOI: 10.21236/ada016403
|View full text |Cite
|
Sign up to set email alerts
|

Jobstream Separator System Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

1977
1977
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Similarly, with the advent of technologies such as computers, measures have been adopted by computer operators to detect and to prevent computers from damaging (Bayuk et al, 2012). Also, during this time, the physical hazards on computers were mostly controlled by guards who used cards to ensure a person's right to use the computer (Schacht, 1975). Scholar McNeil equally noted that, the early 1970s were unfortunately the years of increased number of computer fraud (McNeil, 1978).…”
Section: Democracy and Cyber Securitymentioning
confidence: 99%
“…Similarly, with the advent of technologies such as computers, measures have been adopted by computer operators to detect and to prevent computers from damaging (Bayuk et al, 2012). Also, during this time, the physical hazards on computers were mostly controlled by guards who used cards to ensure a person's right to use the computer (Schacht, 1975). Scholar McNeil equally noted that, the early 1970s were unfortunately the years of increased number of computer fraud (McNeil, 1978).…”
Section: Democracy and Cyber Securitymentioning
confidence: 99%
“…But each change of level wastes a significant amount of system time while the change of environments is being completed. [1] Regardless which alternative is employed, the procedures necessary today to process multiple levels of classified information with computer systems involve increased cost, inconvenience, and/or system inefficiency.…”
Section: Current Adp Security Practicementioning
confidence: 99%